"Today's expansion of enterprise architectures and adoption of hybrid security solutions are adding a new level of complexity for Chief Security Officers (CSOs) and Chief Information Security Officers (CISOs)." —Scott Sanders, Senior VP Verisign Security ServicesClick to Download White PaperHaving a tightly integrated security framework is more critical than ever as cyber-attacks grow and enterprises employ a variety of on-premise and cloud-based computing services to deliver applications. Today's expansion of enterprise architectures and adoption of hybrid security solutions are adding a new level of complexity for Chief Security Officers (CSOs) and Chief Information Security Officers (CISOs).

To protect against today's attacks, there is a need to expand the security framework from the ground up and design for the changing computing landscape. Our newly released white paper, Framework for Resilient Cybersecurity, will provide you with details on the following recommendations in order to design, or choose a framework that allows for a unified, resilient defense of the entire security ecosystem:

Evaluate the threat landscape – The first step to architecting a resilient defense and spending IT security dollars is to understand threats in context to protect resources accordingly.

Choose the right security tools designed for both security and flexibility – It is important to design a security framework that is flexible enough to accommodate a range of business needs and goals in an era when the threat landscape, technology innovations, deployment environments and user trends are undergoing constant change.

Prepare for threats, breaches and attacks by correlating signals and orchestrating responses – Having a response plan in place ensures that you can quickly and effectively respond to a security incident.

Expand to a hybrid premise and cloud security architecture – Just as enterprises today are choosing a mix of private and public cloud computing, and Content Delivery Network (CDN) services for performance to meet their needs, the same approach must extend to security services as well.

Drawing on Verisign’s expertise and experience, this paper identifies key requirements of a flexible security framework, and explores how enterprises can use application programming interfaces (APIs) to extract signals and use a mix of security components on-premise and in the cloud to enhance their existing security ecosystem.

Security architectures are continuously evolving and the enterprise attack surface expands and the threat landscape grows. Enterprises must consider adopting a wide spectrum of on-premise, cloud-based and hybrid security solutions in their defense strategy. These solutions need to be carefully integrated in order to prevent gaps in security and maximize the value of telemetry coming from these investments. A framework that leverages APIs to connect services, share data and automate processes allows enterprises to create a unified, resilient defense against cyberthreats.

About Verisign – Verisign, a global provider of domain name registry services and internet infrastructure, enables internet navigation for many of the world's most recognized domain names. Verisign enables the security, stability, and resiliency of key internet infrastructure and services, including providing root zone maintainer services, operating two of the 13 global internet root servers, and providing registration services and authoritative resolution for the .com and .net top-level domains, which support the majority of global e-commerce. To learn more about what it means to be Powered by Verisign, please visit Verisign.com. Visit Page

If you are pressed for time ...

... this is for you. More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Vinton Cerf, Co-designer of the TCP/IP Protocols & the Architecture of the Internet